MIS- Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. Due process Accountability The courts of appeal The judicial system Liability

Accountability

Which of the following is not a U.S. federal law affecting private institutions? COPPA HIPAA Gramm-Leach-Bliley Act Video Privacy Protection Act Computer Matching and Privacy Protection Act

Computer Matching and Privacy Protection Act

Which of the following protects the authors of a book from having their work copied by others? Patent protection Due process Copyright law Fair Use Doctrine Trade Secret law

Copyright law

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Liability Due process Responsibility Accountability The judicial system

Due process

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Property rights and obligations System quality Accountability and control Quality of life Information rights and obligations

Information rights and obligations

Which of the following best describes the effect that new information technology has on society? It has a dampening effect on the discourse of business ethics. It has a ripple effect, raising new ethical, social, and political issues. It is beneficial for society as a whole, while raising dilemmas for consumers. It has a waterfall effect in raising ever more complex ethical issues. It has a magnifying effect, creating increasing numbers of ethical issues.

It has a ripple effect, raising new ethical, social, and political issues.

What is not a feature of the General Data Protection Regulation (GDPR)? It applies to all firms doing business in the EU. It requires unambiguous consent for using personal data to construct profiles. It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. It creates a single EU privacy policy. It prevents firms from using cookies.

It prevents firms from using cookies.

FIP principles are based on a belief in which of the following? Accountability of the record holder Responsibility of the record holder Mutuality of interest between the record holder and the individual Privacy of the individual Difference between the interests of the individual and commercial organizations

Mutuality of interest between the record holder and the individual

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? HIPAA FIP NORA COPPA Spyware

NORA

What percent of global Internet users use Google Search and other Google services such as YouTube? Less than 10 percent Around 25 percent About 50 percent Nearly 80 percent Over 90 percent

Nearly 80 percent

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Profiling Phishing Spamming Targeting Spyware

Profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Property rights and obligations System quality Accountability and control Information rights and obligations Quality of life

Property rights and obligations

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? Slippery-slope rule Lemming rule High-failure cost rule Utilitarian principle Golden Rule

Slippery-slope rule

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? The Privacy Act The Gramm-Leach-Bliley Act The Freedom of Information Act COPPA HIPPA

The Privacy Act

Which of the following is not an example of the moral dimensions of the information age identified in the text? Information rights and obligations The emergence of giant tech firms that dominate their markets Accountability and control System quality Quality of life

The emergence of giant tech firms that dominate their markets

All of the following are steps in the process for analyzing an ethical issue except: assigning responsibility. identifying the stakeholders. identifying the options you can reasonably take. identifying and clearly describing the facts. identifying the potential consequences of your options.

assigning responsibility

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue. True False

false

In today's legal environment, managers who are convicted for the illegal use of information systems are still unlikely to be given a prison sentence. True False

false

________ means that you accept the potential costs and obligations for the decisions you make. Responsibility Accountability Liability Due process Duty

responsibility

The GDPR created a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. COPPA P3P PGP FIP safe harbor

safe harbor

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? Kant's categorical imperative the risk aversion principle the utilitarian principle the Golden Rule the "no free lunch" rule

the Golden Rule

"Look and feel" copyright infringement lawsuits are concerned with: the distinction between tangible and intangible ideas. the distinction between an idea and its expression. using the graphical elements of another product. using the creative elements of another product. violation of a monopoly on the ideas behind a product.

the distinction between an idea and its expression.

Liability is a feature of political systems and allows individuals to recover damages done to them by others. True False

true

Routine violations of individual privacy are made easier by advances in data storage. True False

true

The FIP principle of Notice/Awareness states that: customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. there must be a mechanism in place to enforce FIP principles. consumers should be able to review the data collected about them. websites must disclose their information practices before collecting data.

websites must disclose their information practices before collecting data.

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? His action is acceptable, because the grocer suffers the least harm. His action is acceptable, because the higher social value is the survival of the family. His action is wrong, because the man would not want the grocer to steal from him. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. His action is wrong, because the grocery store owner is harmed.

His action is acceptable, because the higher social value is the survival of the family.

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. True False

true

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. True False

true

The NAI is an industry association formed to help with which of the following? Copyright protection Online privacy issues Patent protection Trademark protection Trade secret protection

Online privacy issues

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Family and home Property rights and obligations System quality Accountability and control Quality of life

Quality of life

Which of the following best describes how new information systems can result in legal gray areas? They work with networked, digital data, which are more difficult to control than information stored manually. They result in new situations that are not covered by old laws. They are implemented by technicians rather than managers. They are created from sets of logical and technological rules rather than social or organizational mores. They are little understood by politicians or lawyers.

They result in new situations that are not covered by old laws.

When a cookie is created during a website visit, it is stored: on the website's server. on the hard drive of the visitor's computer. on the ISP's servers. in the browser's application settings. nowhere, because they are only used during a visit and are discarded once a visitor leaves the website.

on the hard drive of the visitor's computer.

According to ________, you should take the action that produces the least harm. Kant's categorical imperative the risk aversion principle the utilitarian principle the Golden Rule the "no free lunch" rule

the risk aversion principle

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Copyright Patent All forms of intellectual property protection Trademark Trade secret

Trade secret

The Network Advertising Initiative is an industry association that: encourages self-regulation to develop a set of privacy guidelines for its members. protects user privacy during interactions with websites. has established technical guidelines for ensuring privacy. regulates the use of customer information by firms. is a safe harbor program established by the U.S. government.

encourages self-regulation to develop a set of privacy guidelines for its members.

The ethical "no free lunch" rule states that: if an action cannot be taken repeatedly, then it is not right to be taken at any time. one should take the action that produces the least harm or incurs the least cost. one can put values in rank order and understand the consequences of various courses of action. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. if an action is not right for everyone to take, it is not right for anyone to take.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. opt-in opt-out P3P PGP safe harbor

opt-in

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? HIPAA Gramm-Leach-Bliley Act Privacy Protection Act Freedom of Information Act COPPA

HIPAA

All of the following are technical solutions to protecting user privacy except: email encryption. anonymous surfing. anonymous email. preventing client computers from accepting cookies. data use policies.

data use policies.

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: firms should build products and services that protect privacy. firms should increase the transparency of their data collection. firms should require consumer consent and provide clear options to opt out of data collection. firms should limit the length of time that any personal data is stored to six months or less. consumers should be able to review and contest the accuracy and completeness of data.

firms should limit the length of time that any personal data is stored to six months or less.

All of the following laws apply to actions by the federal government except the: Freedom of Information Act. Privacy Act. Computer Security Act. Children's Online Privacy Protection Act. E-Government Act.

Children's Online Privacy Protection Act.

Which of the following best describes Immanuel Kant's categorical imperative? If an action cannot be taken repeatedly, then it is not right to be taken at any time. One should take the action that produces the least harm or incurs the least cost. One can put values in rank order and understand the consequences of various courses of action. If an action is not right for everyone to take, it is not right for anyone to take. You should act towards others as you would like them to act towards you.

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is not one of the current key technology trends that raises ethical issues? Data storage improvements Data analysis advancements Increase in data quality Increase in use of mobile devices Advances in networking technology

Increase in data quality

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? Kant's Categorical Imperative The Golden Rule The Risk Aversion Principle The "No free lunch" rule The slippery-slope rule

Kant's Categorical Imperative


Ensembles d'études connexes

ABC UNIT 1 basic study of canines

View Set

Module 8 - Sleep and Dreams - Quiz #2

View Set

L4M6 Supplier Relationships all chapters revision

View Set

Direct/Automatic Input Devices and Uses

View Set

CCNA Security Final Exam - CCNAS v2.0

View Set

Sequence of Blood Flow Through the Heart and Body

View Set

Chapter 13: Savings, Investment, and the Financial System

View Set